Is Technology Undermining Democracy?

Is technology undermining democracy? Do we ever really know how we arrive at our political views?

The pixelated vision of the near future offered in Jamie Bartlett’s new book would suggest that, as we continue to submerge into evermore complex and determinate technological systems, knowing the answer to such questions will become even more difficult.

As well as our concepts and theories, our democratic structures were, Bartlett points out, just not built for the types of technological shifts we are experiencing. Algorithms, cryptocurrency, data targeting, techno monopolies and the like, have changed the game. The result, he argues here, is that technology has now come to undermine a number of the ‘fundamental components of a functioning political system’. The tension between technology and democracy is reaching a new boiling point.

Where his previous book Radicals was about the extremes of politics, and how they sometimes worked their way into mainstream thought, this book by-passes the margins and deals directly with the center field. Following the recent debates around the use of social media data, it’s hard to imagine a timelier book. It zips along, covering the six pillars of democracy, as it is described, and imagining the tensions arising in each. Following a conclusion, the epilogue of the book moves from diagnosis to prescription, offering some potential ways of addressing the problems democracy faces.

The magnitude and severity of the challenges outlined in the earlier chapters mean that the solutions have quite a hill to climb.

The potential solutions are welcome and act as an antidote to the rising fear that the chapters provoke, yet despite their intended hopefulness they seem to underline the magnitude of the problems themselves. The suggestion around policing the algorithms seems to understate the problem and the suggestions around the taxation of robots seems unenforable. There remain though a number of ideas that seem to cut through; the ‘Universal Training Income’ is innovative, the focus on capital seems viable, and the more human and individual actions suggested are where the book offers its richest guide to the future.

In all of this Bartlett’s central concern is with growing inequality. By the end, you can see exactly why he is worried. The growing elite of techno capitalists are gaining unforeseen powers to determine online encounters and more. As Bartlett argues, when we consider these growing tech monopolies we should worry about the assumptions, ideas and futures upon which their victories are based. The destruction of jobs and of alternatives social structures leaves a field in which, as Bartlett notes, the few will achieve whatever they want and everyone else will be left to flounder. This power is couched in a more progressive type of rhetoric.

As Bartlett adds, ‘the worse these companies behave and the richer they become, the more they spend on looking cool and talking about fairness and community’.

This is why Bartlett turns to the classic concepts of hegemony and the panopticon in his book — they capture the advancing dominance of certain ideologies and the self-regulating surveillance that work in tandem in these power dynamics. Gramsci and Foucault don’t fully rear their heads, but there is enough to give some sense of the features that cut-across these platforms. Alongside this, the rise of what he calls ‘re-tribalistion’, where we are drawn towards those like us in online spaces, means that collective resistance to this power becomes difficult — we are too dispersed and distanced across these distributed networks.

Arriving at this volume, we could wonder what is really left to be said about technology and democracy.

The combination of the changing ways in which technology is being used to intervene in democracy, which has found a new purpose with the increases in data, and the way that Bartlett is able to navigate through some wide ranging terrain, mean that this book still brings a freshness of perspective.

Mixing together broader and sometimes familiar shifts in technologies with interviews and behind-the-curtain observations — made from visits to data campaign teams, silicon valley locations, venture capitalists and even Cambridge Analytica — the book offers plenty of moments of intrigue and insight.

The way Bartlett weaves blockchain into the discussion of political disruption, for example, is typical of the type of unusual perspective that the book brings.

From these provocations it becomes clear that there is still much more to be said about these long evolving relations. There is also a pressing need to reflect on the possible solutions.

The People Vs Tech by Jamie Bartlett (Ebury Press, Penguin ISBN: 978-1785039065)

David Beer is Reader in Sociology at the University of York

You Might Also Read:

The Cambridge Analytica Row Shows Politics Are Moving In A Disturbing Direction:

 

« Senior IT Execs Admit Cyber Threats Are Out Of Control
GDPR: It’s A Marathon, Not A Sprint »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

ImpactQA

ImpactQA

ImpactQA is a global leading software testing & QA consulting company. Ten years of excellence. Delivering unmatched services & digital transformation to SMEs & Fortune 500 companies.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Harrison Clarke

Harrison Clarke

Harrison Clarke is a leading staffing and recruiting firm in the Cloud, Cybersecurity, Data & AI space.

ClearFocus Technologies

ClearFocus Technologies

ClearFocus Technologies provides advanced cybersecurity services that secure our nation’s most sensitive assets.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.